Also check 'nospectre_v2' with 'spectre_v2'
authorAlexander Popov <alex.popov@linux.com>
Sun, 2 Oct 2022 18:45:13 +0000 (21:45 +0300)
committerAlexander Popov <alex.popov@linux.com>
Sun, 2 Oct 2022 18:45:13 +0000 (21:45 +0300)
kconfig_hardened_check/__init__.py

index 8f59b34f3fc17ba0ee287a08235f3f888499575d..340975865825c3b10399600c79b1bce4ba610776 100644 (file)
@@ -749,7 +749,8 @@ def add_cmdline_checks(l, arch):
     # 'self_protection', 'clipos'
     l += [CmdlineCheck('self_protection', 'clipos', 'page_alloc.shuffle', '1')]
     if arch in ('X86_64', 'X86_32'):
-        l += [CmdlineCheck('self_protection', 'clipos', 'spectre_v2', 'on')]
+        l += [AND(CmdlineCheck('self_protection', 'clipos', 'spectre_v2', 'on'),
+                  CmdlineCheck('self_protection', 'defconfig', 'nospectre_v2', 'is not set'))]
 
     # 'cut_attack_surface', 'kspp'
     if arch == 'X86_64':